DocumentCode
708133
Title
Active authentication using scrolling behaviors
Author
El Masri, Alaa ; Wechsler, Harry ; Likarish, Peter ; Grayson, Christopher ; Pu, Calton ; Al-Arayed, Dalal ; Kang, Brent ByungHoon
Author_Institution
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
fYear
2015
fDate
7-9 April 2015
Firstpage
257
Lastpage
262
Abstract
This paper addresses active authentication using scrolling behaviors for biometrics and assesses different classification and clustering methods that leverage those traits. The dataset used contained event-driven temporal data captured through monitoring users´ reading habits. The derived feature set is mainly composed of users´ scrolling events and their derivatives (changes) and 5-gram sequencing of scrolling events to increase the number of feature extracted and their context. Classification performance in terms of both accuracy and Area under the Curve (AUC) for Receiver Operating Characteristic (ROC) curve is first reported using several classification methods including Random Forests (RF), RF with SMOTE (for unbalanced dataset) and AdaBoost with Decision Stump and ADTree. The best performance was obtained, however, using k-means clustering with two methods used to authenticate users: simple ranking and profile standard error filtering, with the latter achieving a success rate of 83.5%. Our use of k-means represents a novel non-intrusive approach of active and continuous re-authentication to counter insider-threat. Our main contribution comes from the features considered and their coupling to k-means to create a novel state-of-the art active user re-authentication method.
Keywords
biometrics (access control); feature extraction; learning (artificial intelligence); pattern classification; pattern clustering; ADTree; AUC; AdaBoost; RF; ROC curve; SMOTE; active authentication; area under the curve; biometrics; classification methods; continuous re-authentication; decision stump; event-driven temporal data; feature extraction; insider-threat; k-means clustering; profile standard error filtering; random forests; ranking; receiver operating characteristic; scrolling behaviors; scrolling events 5-gram sequencing; user reading habits monitoring; Authentication; Biometrics (access control); Feature extraction; Radio frequency; Standards; Support vector machines; Active authentication; AdaBoost; Behavioral Biometrics; Random Forests; SMOTE; k-means clustering;
fLanguage
English
Publisher
ieee
Conference_Titel
Information and Communication Systems (ICICS), 2015 6th International Conference on
Conference_Location
Amman
Type
conf
DOI
10.1109/IACS.2015.7103185
Filename
7103185
Link To Document